Sort By DateDate Suzette Bailey Jones - Cyber Defense: The Big Picture - SECUREWV 14 REBOOT Suzette Bailey Jones - Cyber Defense: The Big Picture - SECUREWV 14 REBOOT 15 views 0 0 Nathan Rice Breaking In to Breaking in: How to be a pentester - SECUREWV 14 REBOOT Nathan Rice Breaking In to Breaking in: How to be a pentester - SECUREWV 14 REBOOT 112 views 2 0 Jim Jones - Yes, Backups Do Matter: Designing Disaster Recovery for a Ransomware World Jim Jones - Yes, Backups Do Matter: Designing Disaster Recovery for a Ransomware World 31 views 0 0 Shana Nicholson - The Cybersecurity Master: The Cyber Force Path to Secure your Business Galax Shana Nicholson - The Cybersecurity Master: The Cyber Force Path to Secure your Business Galax 10 views 1 0 Karinne Bessette - Azure Storage And Security: Best Practices Redesigned - SECUREWV 14 REBOOT Karinne Bessette - Azure Storage And Security: Best Practices Redesigned - SECUREWV 14 REBOOT 11 views 0 0 Karinne Bessette - Essential Microsoft 365 Security Features - SECUREWV 14 REBOOT Karinne Bessette - Essential Microsoft 365 Security Features - SECUREWV 14 REBOOT 21 views 2 0 Benny Karnes - Pivoting Basics Workshop - SECUREWV 14 REBOOT Benny Karnes - Pivoting Basics Workshop - SECUREWV 14 REBOOT 30 views 3 0 Matt Schuerer & Tuan Phan - The Artifacts Aren't Fiction Matt Schuerer & Tuan Phan - The Artifacts Aren't Fiction 10 views 0 0 Kenneth Peeples - Scale Team Threat Hunting with Kestrel as a Service - SECUREWV 14 REBOOT Kenneth Peeples - Scale Team Threat Hunting with Kestrel as a Service - SECUREWV 14 REBOOT 15 views 1 0 DJ Holly - Going Deep! - Defense-in-Depth with overlapping capability - SECUREWV 14 REBOOT DJ Holly - Going Deep! - Defense-in-Depth with overlapping capability - SECUREWV 14 REBOOT 10 views 0 0 Chris Galaska - Enterprise Network Design - SECUREWV 14 REBOOT Chris Galaska - Enterprise Network Design - SECUREWV 14 REBOOT 3 views 0 0 Chris May - Cyber Security: 2023 Threat and Strategy Update - SECUREWV 14 REBOOT Chris May - Cyber Security: 2023 Threat and Strategy Update - SECUREWV 14 REBOOT 22 views 0 0 Adam Compton Finding your Home in Infosec - SECUREWV 14 REBOOT Adam Compton Finding your Home in Infosec - SECUREWV 14 REBOOT 17 views 0 0 James McQuiggan - KEYNOTE - The Dark Side of AI: Malware, Scams, and Beyond - SECUREWV 14 REBOOT James McQuiggan - KEYNOTE - The Dark Side of AI: Malware, Scams, and Beyond - SECUREWV 14 REBOOT 50 views 1 0 James Mcquiggan ISC2 CyberSecurity Certification Workshop James Mcquiggan ISC2 CyberSecurity Certification Workshop 53 views 2 0 Erich Kron SecureWV 14 Friday Keynote Erich Kron SecureWV 14 Friday Keynote 42 views 0 0 Erich and James SecureWV 14 REBOOT Erich and James SecureWV 14 REBOOT 23 views 2 0 James Mcquiggan SecureWV 14 Reboot James Mcquiggan SecureWV 14 Reboot 57 views 5 0 Nate Hicks - Threat Hunting For Dummies - LUCKY TH1RT3EN Nate Hicks - Threat Hunting For Dummies - LUCKY TH1RT3EN 199 views 12 0 Micah Brown - I Got 99 Problems but a WAF ain’t one - LUCKY TH1RT3EN Micah Brown - I Got 99 Problems but a WAF ain’t one - LUCKY TH1RT3EN 22 views 0 0 Aurthur Sions - Perceptions of Sharing cyber threat intel - LUCKY TH1RT3EN Aurthur Sions - Perceptions of Sharing cyber threat intel - LUCKY TH1RT3EN 14 views 0 0 Eric Shultz - Introduction to Powershell - LUCKY TH1RT3EN Eric Shultz - Introduction to Powershell - LUCKY TH1RT3EN 15 views 3 0 Brian Hoskinson - A Look at Developing Cybersecurity Policies - LUCKY TH1RT3EN Brian Hoskinson - A Look at Developing Cybersecurity Policies - LUCKY TH1RT3EN 24 views 2 0 Women in Tech Round Table - LUCKY TH1RT3EN Women in Tech Round Table - LUCKY TH1RT3EN 17 views 0 0 Micah Brown - Star Wars: How an ineffective Data Governance destroyed the Gal Emp LUCKY TH1RT3EN Micah Brown - Star Wars: How an ineffective Data Governance destroyed the Gal Emp LUCKY TH1RT3EN 6 views 0 0 Women in Tech Round Table - LUCKY TH1RT3EN Women in Tech Round Table - LUCKY TH1RT3EN 11 views 0 0 Daniel Faltisco - From Black Cat to Blue Hat The State of Ransomware 2022 LUCKY TH1RT3EN mp4 Daniel Faltisco - From Black Cat to Blue Hat The State of Ransomware 2022 LUCKY TH1RT3EN mp4 11 views 0 0 James Mcquiggan - Ransomware, Ransom war & Ran some where - LUCKY TH1RT3EN James Mcquiggan - Ransomware, Ransom war & Ran some where - LUCKY TH1RT3EN 67 views 3 0 Nathan Rice -Malware 101 - LUCKY TH1RT3EN Nathan Rice -Malware 101 - LUCKY TH1RT3EN 42 views 5 0 Dwayne Mcdaniel - App Security Does Not Need To Be Fun - LUCKY TH1RT3EN Dwayne Mcdaniel - App Security Does Not Need To Be Fun - LUCKY TH1RT3EN 7 views 0 0 Jason Shirley - Greenbone Security Assistant - LUCKY TH1RT3EN Jason Shirley - Greenbone Security Assistant - LUCKY TH1RT3EN 63 views 0 0 Eric Shultz - CTF with Powershell - LUCKY TH1RT3EN Eric Shultz - CTF with Powershell - LUCKY TH1RT3EN 30 views 1 0 Mick Douglas - Defending Against Advanced Adversaries - LUCKY TH1RT3EN Mick Douglas - Defending Against Advanced Adversaries - LUCKY TH1RT3EN 29 views 0 0 Adam Compton - Hillbilly Storytime (2022 Edition) - Pentest Fails - LUCKY TH1RT3EN Adam Compton - Hillbilly Storytime (2022 Edition) - Pentest Fails - LUCKY TH1RT3EN 25 views 0 0 Brandon Curnutte - Amateur Radio 101 - LUCKY TH1RT3EN Brandon Curnutte - Amateur Radio 101 - LUCKY TH1RT3EN 26 views 1 0 Ryan Ashley - AI Assurance for system operators - LUCKY TH1RT3EN Ryan Ashley - AI Assurance for system operators - LUCKY TH1RT3EN 8 views 1 0 Brian Martin - Career Arcs - LUCKY TH1RT3EN Brian Martin - Career Arcs - LUCKY TH1RT3EN 17 views 1 0 Bill Gardner - Demystifying Zero Trust - LUCKY TH1RT3EN Bill Gardner - Demystifying Zero Trust - LUCKY TH1RT3EN 25 views 1 0 Philip Polstra - Bashing into Forensics - LUCKY TH1RT3EN Philip Polstra - Bashing into Forensics - LUCKY TH1RT3EN 66 views 1 0 Matt Scheurer - Becoming an IR Superstar - LUCKY TH1RT3EN Matt Scheurer - Becoming an IR Superstar - LUCKY TH1RT3EN 91 views 4 0 Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры 39 views 0 0 Paying it Forward with Threat Intelligence 2.0 Paying it Forward with Threat Intelligence 2.0 35 views 1 0 Hacker Rights Hacker Rights 41 views 1 0 Story time: How I fell into security and what you can learn from my mistakes Story time: How I fell into security and what you can learn from my mistakes 38 views 0 0 WE ARE... ANONYMOUS - A Study of Neutralizations WE ARE... ANONYMOUS - A Study of Neutralizations 95 views 6 0 If A User Can Ruin Your Network, Your Network Sucks If A User Can Ruin Your Network, Your Network Sucks 35 views 0 0 I broke in, now what? Linux manual privilege escalation 101 I broke in, now what? Linux manual privilege escalation 101 84 views 8 0 Daleks performing a Jedi Mind Meld: Communicating Risk and Issues Daleks performing a Jedi Mind Meld: Communicating Risk and Issues 16 views 1 0 Vishing, Vishing Everywhere Vishing, Vishing Everywhere 31 views 1 0 KeyNote: Cyber Deception- Even MITRE thinks it's cool KeyNote: Cyber Deception- Even MITRE thinks it's cool 70 views 3 0 Welcome Welcome 58 views 0 0 Russia’s Campaign to Influence U.S. Elections Russia’s Campaign to Influence U.S. Elections 48 views 1 0 Bash Scripting Bash Scripting 53 views 0 0 Robert Krug - Keynote Robert Krug - Keynote 85 views 0 0 Python for Data Science Python for Data Science 65 views 1 0 Workforce Development Using the NICE Framework Workforce Development Using the NICE Framework 310 views 7 0 Containerization for the Hybrid Cloud Containerization for the Hybrid Cloud 44 views 3 0 Mobile Forensics An Introduction Mobile Forensics An Introduction 596 views 27 0 Closing Awards Closing Awards 16 views 0 0 Bitcoin From Zero to I get it Bitcoin From Zero to I get it 4 views 0 0 Securing The Secure Shell The Automated Way Securing The Secure Shell The Automated Way 35 views 1 0 How to hack all the bug bounty things automagically reap the rewards profit How to hack all the bug bounty things automagically reap the rewards profit 122 views 5 0 Giving Back Submitting to PTES 101 Giving Back Submitting to PTES 101 3 views 0 0 SecureWV Hack3rcon Live Stream 2of2 SecureWV Hack3rcon Live Stream 2of2 10 views 0 0 SecureWV Hack3rcon Live Stream 1of2 SecureWV Hack3rcon Live Stream 1of2 16 views 0 0 Closing Ceremony 2019 Closing Ceremony 2019 16 views 0 0 Closed for Business: Taking Down Darknet Markets Closed for Business: Taking Down Darknet Markets 312 views 5 0 It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots 52 views 0 0 Lend me your IR’s! Lend me your IR’s! 55 views 0 0 Cyber Defense In The Modern Org Cyber Defense In The Modern Org 27 views 0 0 Dissect Tor Bridge and Pluggable Transport Dissect Tor Bridge and Pluggable Transport 225 views 4 0 Emergent Gameplay Emergent Gameplay 18 views 0 0 Hackers Hugs and Drugs Hackers Hugs and Drugs 10 views 0 0 FLDigi E mail over Packet Radio FLDigi E mail over Packet Radio 139 views 0 0 Speaker00 Intro Speaker00 Intro 21 views 0 0 Pis Pis and wifi Pis Pis and wifi 10 views 1 0 Vehicle Forensics An Emerging Source of Evidence Vehicle Forensics An Emerging Source of Evidence 320 views 8 0 Hillbilly Storytime Pentest Fails Hillbilly Storytime Pentest Fails 9 views 1 0 Fighting Advanced Persistent Threats with Advanced Persistent Security Fighting Advanced Persistent Threats with Advanced Persistent Security 52 views 1 0 Digital Forensic Analysis Planning and Execution - part2 Digital Forensic Analysis Planning and Execution - part2 12 views 0 0 Security Through Ansible Automation Security Through Ansible Automation 68 views 1 0 Value of threat intelligence Value of threat intelligence 6 views 0 0 Coming Up with the Next Wave of Cyber Innovations Start by Thinking 1ns1d3 th3 B0x Coming Up with the Next Wave of Cyber Innovations Start by Thinking 1ns1d3 th3 B0x 9 views 0 0 Secrets of Superspies Secrets of Superspies 23 views 0 0 SDR RF Hacking Primer SDR RF Hacking Primer 75 views 1 0 Technical Testimony Doing the Heavy Lifting for the Jury Technical Testimony Doing the Heavy Lifting for the Jury 3 views 0 0 911 DDOS 911 DDOS 4 views 0 0 Network Forensics using Kali Linux andor SANS Sift Network Forensics using Kali Linux andor SANS Sift 460 views 9 0 From junk to jewels Destruction is the key to building From junk to jewels Destruction is the key to building 2 views 0 0 Total Recall Using Implicit Memory as a Cryptographic Primitive Total Recall Using Implicit Memory as a Cryptographic Primitive 10 views 0 0 I survived Ransomeware Twice I survived Ransomeware Twice 7 views 0 0 Digital Forensic Analysis Planning and Execution - part1 Digital Forensic Analysis Planning and Execution - part1 33 views 1 0 Intro to WireShark Intro to WireShark 37 views 0 0 SCAP A Primer and Customization SCAP A Primer and Customization 106 views 2 0 IoT Panel IoT Panel 7 views 0 0 Closing Ceremonies Closing Ceremonies 7 views 0 0 Election Officials as IT Managers Election Officials as IT Managers 269 views 0 0 What We Do In The Shadows: "Going Dark" With Consumer Electronics What We Do In The Shadows: "Going Dark" With Consumer Electronics 59 views 0 0 Building an Application Security Program Building an Application Security Program 42 views 1 0 "Paying it Forward" with Threat Intelligence "Paying it Forward" with Threat Intelligence 7 views 0 0 Ham radio and YOU Ham radio and YOU 34 views 2 0 Cybersecurity Maturity Model – The Compliance Standard You’ve Always Wanted Cybersecurity Maturity Model – The Compliance Standard You’ve Always Wanted 21 views 0 0 Block chain and Crypto Currency Block chain and Crypto Currency 9 views 0 0 The cost savings of NOT terrifying your leadership. The cost savings of NOT terrifying your leadership. 8 views 0 0 2019 TV News Coverage - Featuring ILF 2019 TV News Coverage - Featuring ILF 32 views 1 0 2019 TV News Coverage 2019 TV News Coverage 67 views 0 0 Automating Security Operations on a budget Automating Security Operations on a budget 11 views 0 0 Advanced threat hunting with open source tools and no budget Advanced threat hunting with open source tools and no budget 99 views 6 0 Outside the Box How the Internet of Things Poses New Cybersecurity Risks and Challenges Outside the Box How the Internet of Things Poses New Cybersecurity Risks and Challenges 8 views 0 0 Security Automation for the Blue Team Security Automation for the Blue Team 77 views 2 0 A deep look at Stack Buffer Overflows and Format String Vulnerabilities A deep look at Stack Buffer Overflows and Format String Vulnerabilities 11 views 0 0 The New Age of Ransomware Cybercriminals Adopt Nation State Techniques The New Age of Ransomware Cybercriminals Adopt Nation State Techniques 7 views 0 0 Mobile devices and you Mobile devices and you 11 views 2 0 Why The Legal System Needs Your Help Why The Legal System Needs Your Help 5 views 0 0 A Brief Introduction to Metasploit A Brief Introduction to Metasploit 13 views 0 0 Welcome to SecureWV Hack3rCon Welcome to SecureWV Hack3rCon 23 views 0 0 Gun Safety Class Gun Safety Class 5 views 0 0 Keynote Hackers Hugs Drugs Part II Keynote Hackers Hugs Drugs Part II 3 views 0 0 Applying the principles of Dodgeball A True Underdog Story to CTFs Applying the principles of Dodgeball A True Underdog Story to CTFs 23 views 1 0 Red Hat Enterprise Linux Security Technologies Lab Red Hat Enterprise Linux Security Technologies Lab 6 views 0 0 Securing your networks with Ansible Securing your networks with Ansible 26 views 0 0 The Hybrid Home Lab From Laptop to Cloud The Hybrid Home Lab From Laptop to Cloud 27 views 0 0 Python Scripting Python Scripting 14 views 0 0
Sort By DateDate Suzette Bailey Jones - Cyber Defense: The Big Picture - SECUREWV 14 REBOOT Suzette Bailey Jones - Cyber Defense: The Big Picture - SECUREWV 14 REBOOT 15 views 0 0 Nathan Rice Breaking In to Breaking in: How to be a pentester - SECUREWV 14 REBOOT Nathan Rice Breaking In to Breaking in: How to be a pentester - SECUREWV 14 REBOOT 112 views 2 0 Jim Jones - Yes, Backups Do Matter: Designing Disaster Recovery for a Ransomware World Jim Jones - Yes, Backups Do Matter: Designing Disaster Recovery for a Ransomware World 31 views 0 0 Shana Nicholson - The Cybersecurity Master: The Cyber Force Path to Secure your Business Galax Shana Nicholson - The Cybersecurity Master: The Cyber Force Path to Secure your Business Galax 10 views 1 0 Karinne Bessette - Azure Storage And Security: Best Practices Redesigned - SECUREWV 14 REBOOT Karinne Bessette - Azure Storage And Security: Best Practices Redesigned - SECUREWV 14 REBOOT 11 views 0 0 Karinne Bessette - Essential Microsoft 365 Security Features - SECUREWV 14 REBOOT Karinne Bessette - Essential Microsoft 365 Security Features - SECUREWV 14 REBOOT 21 views 2 0 Benny Karnes - Pivoting Basics Workshop - SECUREWV 14 REBOOT Benny Karnes - Pivoting Basics Workshop - SECUREWV 14 REBOOT 30 views 3 0 Matt Schuerer & Tuan Phan - The Artifacts Aren't Fiction Matt Schuerer & Tuan Phan - The Artifacts Aren't Fiction 10 views 0 0 Kenneth Peeples - Scale Team Threat Hunting with Kestrel as a Service - SECUREWV 14 REBOOT Kenneth Peeples - Scale Team Threat Hunting with Kestrel as a Service - SECUREWV 14 REBOOT 15 views 1 0 DJ Holly - Going Deep! - Defense-in-Depth with overlapping capability - SECUREWV 14 REBOOT DJ Holly - Going Deep! - Defense-in-Depth with overlapping capability - SECUREWV 14 REBOOT 10 views 0 0 Chris Galaska - Enterprise Network Design - SECUREWV 14 REBOOT Chris Galaska - Enterprise Network Design - SECUREWV 14 REBOOT 3 views 0 0 Chris May - Cyber Security: 2023 Threat and Strategy Update - SECUREWV 14 REBOOT Chris May - Cyber Security: 2023 Threat and Strategy Update - SECUREWV 14 REBOOT 22 views 0 0 Adam Compton Finding your Home in Infosec - SECUREWV 14 REBOOT Adam Compton Finding your Home in Infosec - SECUREWV 14 REBOOT 17 views 0 0 James McQuiggan - KEYNOTE - The Dark Side of AI: Malware, Scams, and Beyond - SECUREWV 14 REBOOT James McQuiggan - KEYNOTE - The Dark Side of AI: Malware, Scams, and Beyond - SECUREWV 14 REBOOT 50 views 1 0 James Mcquiggan ISC2 CyberSecurity Certification Workshop James Mcquiggan ISC2 CyberSecurity Certification Workshop 53 views 2 0 Erich Kron SecureWV 14 Friday Keynote Erich Kron SecureWV 14 Friday Keynote 42 views 0 0 Erich and James SecureWV 14 REBOOT Erich and James SecureWV 14 REBOOT 23 views 2 0 James Mcquiggan SecureWV 14 Reboot James Mcquiggan SecureWV 14 Reboot 57 views 5 0 Nate Hicks - Threat Hunting For Dummies - LUCKY TH1RT3EN Nate Hicks - Threat Hunting For Dummies - LUCKY TH1RT3EN 199 views 12 0 Micah Brown - I Got 99 Problems but a WAF ain’t one - LUCKY TH1RT3EN Micah Brown - I Got 99 Problems but a WAF ain’t one - LUCKY TH1RT3EN 22 views 0 0 Aurthur Sions - Perceptions of Sharing cyber threat intel - LUCKY TH1RT3EN Aurthur Sions - Perceptions of Sharing cyber threat intel - LUCKY TH1RT3EN 14 views 0 0 Eric Shultz - Introduction to Powershell - LUCKY TH1RT3EN Eric Shultz - Introduction to Powershell - LUCKY TH1RT3EN 15 views 3 0 Brian Hoskinson - A Look at Developing Cybersecurity Policies - LUCKY TH1RT3EN Brian Hoskinson - A Look at Developing Cybersecurity Policies - LUCKY TH1RT3EN 24 views 2 0 Women in Tech Round Table - LUCKY TH1RT3EN Women in Tech Round Table - LUCKY TH1RT3EN 17 views 0 0 Micah Brown - Star Wars: How an ineffective Data Governance destroyed the Gal Emp LUCKY TH1RT3EN Micah Brown - Star Wars: How an ineffective Data Governance destroyed the Gal Emp LUCKY TH1RT3EN 6 views 0 0 Women in Tech Round Table - LUCKY TH1RT3EN Women in Tech Round Table - LUCKY TH1RT3EN 11 views 0 0 Daniel Faltisco - From Black Cat to Blue Hat The State of Ransomware 2022 LUCKY TH1RT3EN mp4 Daniel Faltisco - From Black Cat to Blue Hat The State of Ransomware 2022 LUCKY TH1RT3EN mp4 11 views 0 0 James Mcquiggan - Ransomware, Ransom war & Ran some where - LUCKY TH1RT3EN James Mcquiggan - Ransomware, Ransom war & Ran some where - LUCKY TH1RT3EN 67 views 3 0 Nathan Rice -Malware 101 - LUCKY TH1RT3EN Nathan Rice -Malware 101 - LUCKY TH1RT3EN 42 views 5 0 Dwayne Mcdaniel - App Security Does Not Need To Be Fun - LUCKY TH1RT3EN Dwayne Mcdaniel - App Security Does Not Need To Be Fun - LUCKY TH1RT3EN 7 views 0 0 Jason Shirley - Greenbone Security Assistant - LUCKY TH1RT3EN Jason Shirley - Greenbone Security Assistant - LUCKY TH1RT3EN 63 views 0 0 Eric Shultz - CTF with Powershell - LUCKY TH1RT3EN Eric Shultz - CTF with Powershell - LUCKY TH1RT3EN 30 views 1 0 Mick Douglas - Defending Against Advanced Adversaries - LUCKY TH1RT3EN Mick Douglas - Defending Against Advanced Adversaries - LUCKY TH1RT3EN 29 views 0 0 Adam Compton - Hillbilly Storytime (2022 Edition) - Pentest Fails - LUCKY TH1RT3EN Adam Compton - Hillbilly Storytime (2022 Edition) - Pentest Fails - LUCKY TH1RT3EN 25 views 0 0 Brandon Curnutte - Amateur Radio 101 - LUCKY TH1RT3EN Brandon Curnutte - Amateur Radio 101 - LUCKY TH1RT3EN 26 views 1 0 Ryan Ashley - AI Assurance for system operators - LUCKY TH1RT3EN Ryan Ashley - AI Assurance for system operators - LUCKY TH1RT3EN 8 views 1 0 Brian Martin - Career Arcs - LUCKY TH1RT3EN Brian Martin - Career Arcs - LUCKY TH1RT3EN 17 views 1 0 Bill Gardner - Demystifying Zero Trust - LUCKY TH1RT3EN Bill Gardner - Demystifying Zero Trust - LUCKY TH1RT3EN 25 views 1 0 Philip Polstra - Bashing into Forensics - LUCKY TH1RT3EN Philip Polstra - Bashing into Forensics - LUCKY TH1RT3EN 66 views 1 0 Matt Scheurer - Becoming an IR Superstar - LUCKY TH1RT3EN Matt Scheurer - Becoming an IR Superstar - LUCKY TH1RT3EN 91 views 4 0 Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры 39 views 0 0 Paying it Forward with Threat Intelligence 2.0 Paying it Forward with Threat Intelligence 2.0 35 views 1 0 Hacker Rights Hacker Rights 41 views 1 0 Story time: How I fell into security and what you can learn from my mistakes Story time: How I fell into security and what you can learn from my mistakes 38 views 0 0 WE ARE... ANONYMOUS - A Study of Neutralizations WE ARE... ANONYMOUS - A Study of Neutralizations 95 views 6 0 If A User Can Ruin Your Network, Your Network Sucks If A User Can Ruin Your Network, Your Network Sucks 35 views 0 0 I broke in, now what? Linux manual privilege escalation 101 I broke in, now what? Linux manual privilege escalation 101 84 views 8 0 Daleks performing a Jedi Mind Meld: Communicating Risk and Issues Daleks performing a Jedi Mind Meld: Communicating Risk and Issues 16 views 1 0 Vishing, Vishing Everywhere Vishing, Vishing Everywhere 31 views 1 0 KeyNote: Cyber Deception- Even MITRE thinks it's cool KeyNote: Cyber Deception- Even MITRE thinks it's cool 70 views 3 0 Welcome Welcome 58 views 0 0 Russia’s Campaign to Influence U.S. Elections Russia’s Campaign to Influence U.S. Elections 48 views 1 0 Bash Scripting Bash Scripting 53 views 0 0 Robert Krug - Keynote Robert Krug - Keynote 85 views 0 0 Python for Data Science Python for Data Science 65 views 1 0 Workforce Development Using the NICE Framework Workforce Development Using the NICE Framework 310 views 7 0 Containerization for the Hybrid Cloud Containerization for the Hybrid Cloud 44 views 3 0 Mobile Forensics An Introduction Mobile Forensics An Introduction 596 views 27 0 Closing Awards Closing Awards 16 views 0 0 Bitcoin From Zero to I get it Bitcoin From Zero to I get it 4 views 0 0 Securing The Secure Shell The Automated Way Securing The Secure Shell The Automated Way 35 views 1 0 How to hack all the bug bounty things automagically reap the rewards profit How to hack all the bug bounty things automagically reap the rewards profit 122 views 5 0 Giving Back Submitting to PTES 101 Giving Back Submitting to PTES 101 3 views 0 0 SecureWV Hack3rcon Live Stream 2of2 SecureWV Hack3rcon Live Stream 2of2 10 views 0 0 SecureWV Hack3rcon Live Stream 1of2 SecureWV Hack3rcon Live Stream 1of2 16 views 0 0 Closing Ceremony 2019 Closing Ceremony 2019 16 views 0 0 Closed for Business: Taking Down Darknet Markets Closed for Business: Taking Down Darknet Markets 312 views 5 0 It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots 52 views 0 0 Lend me your IR’s! Lend me your IR’s! 55 views 0 0 Cyber Defense In The Modern Org Cyber Defense In The Modern Org 27 views 0 0 Dissect Tor Bridge and Pluggable Transport Dissect Tor Bridge and Pluggable Transport 225 views 4 0 Emergent Gameplay Emergent Gameplay 18 views 0 0 Hackers Hugs and Drugs Hackers Hugs and Drugs 10 views 0 0 FLDigi E mail over Packet Radio FLDigi E mail over Packet Radio 139 views 0 0 Speaker00 Intro Speaker00 Intro 21 views 0 0 Pis Pis and wifi Pis Pis and wifi 10 views 1 0 Vehicle Forensics An Emerging Source of Evidence Vehicle Forensics An Emerging Source of Evidence 320 views 8 0 Hillbilly Storytime Pentest Fails Hillbilly Storytime Pentest Fails 9 views 1 0 Fighting Advanced Persistent Threats with Advanced Persistent Security Fighting Advanced Persistent Threats with Advanced Persistent Security 52 views 1 0 Digital Forensic Analysis Planning and Execution - part2 Digital Forensic Analysis Planning and Execution - part2 12 views 0 0 Security Through Ansible Automation Security Through Ansible Automation 68 views 1 0 Value of threat intelligence Value of threat intelligence 6 views 0 0 Coming Up with the Next Wave of Cyber Innovations Start by Thinking 1ns1d3 th3 B0x Coming Up with the Next Wave of Cyber Innovations Start by Thinking 1ns1d3 th3 B0x 9 views 0 0 Secrets of Superspies Secrets of Superspies 23 views 0 0 SDR RF Hacking Primer SDR RF Hacking Primer 75 views 1 0 Technical Testimony Doing the Heavy Lifting for the Jury Technical Testimony Doing the Heavy Lifting for the Jury 3 views 0 0 911 DDOS 911 DDOS 4 views 0 0 Network Forensics using Kali Linux andor SANS Sift Network Forensics using Kali Linux andor SANS Sift 460 views 9 0 From junk to jewels Destruction is the key to building From junk to jewels Destruction is the key to building 2 views 0 0 Total Recall Using Implicit Memory as a Cryptographic Primitive Total Recall Using Implicit Memory as a Cryptographic Primitive 10 views 0 0 I survived Ransomeware Twice I survived Ransomeware Twice 7 views 0 0 Digital Forensic Analysis Planning and Execution - part1 Digital Forensic Analysis Planning and Execution - part1 33 views 1 0 Intro to WireShark Intro to WireShark 37 views 0 0 SCAP A Primer and Customization SCAP A Primer and Customization 106 views 2 0 IoT Panel IoT Panel 7 views 0 0 Closing Ceremonies Closing Ceremonies 7 views 0 0 Election Officials as IT Managers Election Officials as IT Managers 269 views 0 0 What We Do In The Shadows: "Going Dark" With Consumer Electronics What We Do In The Shadows: "Going Dark" With Consumer Electronics 59 views 0 0 Building an Application Security Program Building an Application Security Program 42 views 1 0 "Paying it Forward" with Threat Intelligence "Paying it Forward" with Threat Intelligence 7 views 0 0 Ham radio and YOU Ham radio and YOU 34 views 2 0 Cybersecurity Maturity Model – The Compliance Standard You’ve Always Wanted Cybersecurity Maturity Model – The Compliance Standard You’ve Always Wanted 21 views 0 0 Block chain and Crypto Currency Block chain and Crypto Currency 9 views 0 0 The cost savings of NOT terrifying your leadership. The cost savings of NOT terrifying your leadership. 8 views 0 0 2019 TV News Coverage - Featuring ILF 2019 TV News Coverage - Featuring ILF 32 views 1 0 2019 TV News Coverage 2019 TV News Coverage 67 views 0 0 Automating Security Operations on a budget Automating Security Operations on a budget 11 views 0 0 Advanced threat hunting with open source tools and no budget Advanced threat hunting with open source tools and no budget 99 views 6 0 Outside the Box How the Internet of Things Poses New Cybersecurity Risks and Challenges Outside the Box How the Internet of Things Poses New Cybersecurity Risks and Challenges 8 views 0 0 Security Automation for the Blue Team Security Automation for the Blue Team 77 views 2 0 A deep look at Stack Buffer Overflows and Format String Vulnerabilities A deep look at Stack Buffer Overflows and Format String Vulnerabilities 11 views 0 0 The New Age of Ransomware Cybercriminals Adopt Nation State Techniques The New Age of Ransomware Cybercriminals Adopt Nation State Techniques 7 views 0 0 Mobile devices and you Mobile devices and you 11 views 2 0 Why The Legal System Needs Your Help Why The Legal System Needs Your Help 5 views 0 0 A Brief Introduction to Metasploit A Brief Introduction to Metasploit 13 views 0 0 Welcome to SecureWV Hack3rCon Welcome to SecureWV Hack3rCon 23 views 0 0 Gun Safety Class Gun Safety Class 5 views 0 0 Keynote Hackers Hugs Drugs Part II Keynote Hackers Hugs Drugs Part II 3 views 0 0 Applying the principles of Dodgeball A True Underdog Story to CTFs Applying the principles of Dodgeball A True Underdog Story to CTFs 23 views 1 0 Red Hat Enterprise Linux Security Technologies Lab Red Hat Enterprise Linux Security Technologies Lab 6 views 0 0 Securing your networks with Ansible Securing your networks with Ansible 26 views 0 0 The Hybrid Home Lab From Laptop to Cloud The Hybrid Home Lab From Laptop to Cloud 27 views 0 0 Python Scripting Python Scripting 14 views 0 0